CVE-2022-31792 (GCVE-0-2022-31792)
Vulnerability from cvelistv5 – Published: 2022-09-06 18:24 – Updated: 2024-08-03 07:26
VLAI?
Summary
A stored cross-site scripting (XSS) vulnerability exists in the management web interface of WatchGuard Firebox and XTM appliances. A remote attacker can potentially execute arbitrary JavaScript code in the management web interface by sending crafted requests to exposed management ports. This is fixed in Fireware OS 12.8.1, 12.5.10, and 12.1.4.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T07:26:01.229Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00014"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability exists in the management web interface of WatchGuard Firebox and XTM appliances. A remote attacker can potentially execute arbitrary JavaScript code in the management web interface by sending crafted requests to exposed management ports. This is fixed in Fireware OS 12.8.1, 12.5.10, and 12.1.4."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-06T18:24:45",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00014"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-31792",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A stored cross-site scripting (XSS) vulnerability exists in the management web interface of WatchGuard Firebox and XTM appliances. A remote attacker can potentially execute arbitrary JavaScript code in the management web interface by sending crafted requests to exposed management ports. This is fixed in Fireware OS 12.8.1, 12.5.10, and 12.1.4."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00014",
"refsource": "MISC",
"url": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00014"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-31792",
"datePublished": "2022-09-06T18:24:45",
"dateReserved": "2022-05-27T00:00:00",
"dateUpdated": "2024-08-03T07:26:01.229Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.0.0\", \"versionEndExcluding\": \"12.1.4\", \"matchCriteriaId\": \"50E35898-20FC-4D3E-B059-EDFEEB2E19F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.2.0\", \"versionEndExcluding\": \"12.5.10\", \"matchCriteriaId\": \"58A5359B-EC12-4C13-B9CC-EE1B49DB67AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:watchguard:fireware:12.6.1:u1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EDC1E95-9077-423E-90F4-928068CA6D74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:watchguard:fireware:12.6.1:u3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C557A092-41F2-4325-884C-B4C03E196A56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:watchguard:fireware:12.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41CE5E56-7E6E-48ED-A619-06BE1DAAABD2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:watchguard:fireware:12.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"299FC710-1AA1-4D3F-B902-231114B75B94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:watchguard:fireware:12.7.0:u1:*:*:*:*:*:*\", \"matchCriteriaId\": \"45C56536-625E-4E5A-B77A-CF33CEEBC91D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:watchguard:fireware:12.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"002B43DA-5A94-495D-8736-2FC5997155F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:watchguard:fireware:12.7.2:u2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B189948-8037-4CB1-A859-0CCB5D9576F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:watchguard:fireware:12.8.0:u1:*:*:*:*:*:*\", \"matchCriteriaId\": \"350B4BC0-B366-468B-93BF-366CA72EE5EC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A stored cross-site scripting (XSS) vulnerability exists in the management web interface of WatchGuard Firebox and XTM appliances. A remote attacker can potentially execute arbitrary JavaScript code in the management web interface by sending crafted requests to exposed management ports. This is fixed in Fireware OS 12.8.1, 12.5.10, and 12.1.4.\"}, {\"lang\": \"es\", \"value\": \"Se presenta una vulnerabilidad de tipo cross-site scripting (XSS) almacenado en la interfaz web de administraci\\u00f3n de los dispositivos WatchGuard Firebox y XTM. Un atacante remoto puede potencialmente ejecutar c\\u00f3digo JavaScript arbitrario en la interfaz web de administraci\\u00f3n mediante el env\\u00edo de peticiones dise\\u00f1adas a los puertos de administraci\\u00f3n expuestos. Esto ha sido corregido en Fireware OS versiones 12.8.1, 12.5.10 y 12.1.4.\\n\"}]",
"id": "CVE-2022-31792",
"lastModified": "2024-11-21T07:05:20.157",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 2.7}]}",
"published": "2022-09-06T19:15:08.440",
"references": "[{\"url\": \"https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00014\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00014\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-31792\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-09-06T19:15:08.440\",\"lastModified\":\"2024-11-21T07:05:20.157\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A stored cross-site scripting (XSS) vulnerability exists in the management web interface of WatchGuard Firebox and XTM appliances. A remote attacker can potentially execute arbitrary JavaScript code in the management web interface by sending crafted requests to exposed management ports. This is fixed in Fireware OS 12.8.1, 12.5.10, and 12.1.4.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de tipo cross-site scripting (XSS) almacenado en la interfaz web de administraci\u00f3n de los dispositivos WatchGuard Firebox y XTM. Un atacante remoto puede potencialmente ejecutar c\u00f3digo JavaScript arbitrario en la interfaz web de administraci\u00f3n mediante el env\u00edo de peticiones dise\u00f1adas a los puertos de administraci\u00f3n expuestos. Esto ha sido corregido en Fireware OS versiones 12.8.1, 12.5.10 y 12.1.4.\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.1.4\",\"matchCriteriaId\":\"50E35898-20FC-4D3E-B059-EDFEEB2E19F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.2.0\",\"versionEndExcluding\":\"12.5.10\",\"matchCriteriaId\":\"58A5359B-EC12-4C13-B9CC-EE1B49DB67AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:watchguard:fireware:12.6.1:u1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EDC1E95-9077-423E-90F4-928068CA6D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:watchguard:fireware:12.6.1:u3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C557A092-41F2-4325-884C-B4C03E196A56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:watchguard:fireware:12.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41CE5E56-7E6E-48ED-A619-06BE1DAAABD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:watchguard:fireware:12.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"299FC710-1AA1-4D3F-B902-231114B75B94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:watchguard:fireware:12.7.0:u1:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C56536-625E-4E5A-B77A-CF33CEEBC91D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:watchguard:fireware:12.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"002B43DA-5A94-495D-8736-2FC5997155F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:watchguard:fireware:12.7.2:u2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B189948-8037-4CB1-A859-0CCB5D9576F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:watchguard:fireware:12.8.0:u1:*:*:*:*:*:*\",\"matchCriteriaId\":\"350B4BC0-B366-468B-93BF-366CA72EE5EC\"}]}]}],\"references\":[{\"url\":\"https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00014\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00014\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…